DATA SECURITY MEASURES 5 Sample Clauses

DATA SECURITY MEASURES 5. 1. a) Entry control (measures to prevent unauthorised persons from gaining access to data processing units used to process personal data): The servers used for the operation of WebUntis are accommodated with the housing provider Nextlayer GmbH at the Interxion housing centre in Vienna. The servers used for the operation of the add-on modules of WebUntis are either also located at the afore-mentioned housing centre or at ISO certified housing centres in Germany. At their housing centres, the housing providers guarantee entry control through an entry control and monitoring system, a video surveillance system and security guards. A multi-stage system for the identification of persons authorised to enter the premises is in place (ID card, fingerprint identification). Physical access to the servers is protected by a locked server cabinet in the access-controlled building. Keys are issued only to those persons requiring them and in line with strict rules. b) Access control (measures to prevent unauthorised persons from using data processing systems): Only selected staff members whose names have been provided to the respective housing centre and the respective housing provider have access to the servers on which WebUnits and/or its add-on modules are operated. Therefore, these servers are supported and maintained exclusively by staff of UNTIS GMBH or its Partners. The server systems can only be reached via the Internet using VPN access. The access passwords are subject to state-of-the-art password management that is continuously adjusted to the latest technological developments. c) Permission control (measures to guarantee that the persons authorised to use a data processing system may access exclusively data for which they have access permission and to prevent any unauthorised reading, copying, modifying or removing of such data during processing): User access to the WebUntis application and its add-on modules is password protected. The permission system allows for restrictions of access and competence. A firewall protects the servers from unauthorised access. The housing providers have no permission to access the servers of UNTIS GMBH and its Partners. The WebUnits data of the individual Customers are stored in separate databases. No mixing of data sets and no mutual access of different Customers is possible due to the precise allocation of specific data regions to specific Customers. d) Transmission control (measures to guarantee any unauthorised reading, copy...

Related to DATA SECURITY MEASURES 5

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who ▇▇▇ may contact if there are any data security concerns or questions.